Analysis
-
max time kernel
140s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 01:58
Static task
static1
Behavioral task
behavioral1
Sample
5a03cf3da2472d1fc670ca472a44c215_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5a03cf3da2472d1fc670ca472a44c215_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5a03cf3da2472d1fc670ca472a44c215_JaffaCakes118.exe
-
Size
745KB
-
MD5
5a03cf3da2472d1fc670ca472a44c215
-
SHA1
f139459448d1a43f2a009b36bda01f4e8c33a1bc
-
SHA256
428dfb7e13ac5544b1076a6d17046ff45b360292a561362b0368b55246cf69fe
-
SHA512
195bdf9f890c4799cb775b0632f14423b9008f90f81eba9592e29f94f5c101cbd73a21786a43f62d8514c21ba844022ced1a06f19ab6af6d14ac67617c58f29a
-
SSDEEP
12288:gNMt6F2NEcRpEAbGalTTeETBY2cJBm7vi/mFkw1gMV1/O4Xt3:gNMt60FScZpY2r7AmFkYTVdOst3
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3940 msedge.exe 3940 msedge.exe 2908 msedge.exe 2908 msedge.exe 3876 identity_helper.exe 3876 identity_helper.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4904 wrote to memory of 2908 4904 5a03cf3da2472d1fc670ca472a44c215_JaffaCakes118.exe 92 PID 4904 wrote to memory of 2908 4904 5a03cf3da2472d1fc670ca472a44c215_JaffaCakes118.exe 92 PID 2908 wrote to memory of 4264 2908 msedge.exe 93 PID 2908 wrote to memory of 4264 2908 msedge.exe 93 PID 2908 wrote to memory of 3592 2908 msedge.exe 94 PID 2908 wrote to memory of 3592 2908 msedge.exe 94 PID 2908 wrote to memory of 3592 2908 msedge.exe 94 PID 2908 wrote to memory of 3592 2908 msedge.exe 94 PID 2908 wrote to memory of 3592 2908 msedge.exe 94 PID 2908 wrote to memory of 3592 2908 msedge.exe 94 PID 2908 wrote to memory of 3592 2908 msedge.exe 94 PID 2908 wrote to memory of 3592 2908 msedge.exe 94 PID 2908 wrote to memory of 3592 2908 msedge.exe 94 PID 2908 wrote to memory of 3592 2908 msedge.exe 94 PID 2908 wrote to memory of 3592 2908 msedge.exe 94 PID 2908 wrote to memory of 3592 2908 msedge.exe 94 PID 2908 wrote to memory of 3592 2908 msedge.exe 94 PID 2908 wrote to memory of 3592 2908 msedge.exe 94 PID 2908 wrote to memory of 3592 2908 msedge.exe 94 PID 2908 wrote to memory of 3592 2908 msedge.exe 94 PID 2908 wrote to memory of 3592 2908 msedge.exe 94 PID 2908 wrote to memory of 3592 2908 msedge.exe 94 PID 2908 wrote to memory of 3592 2908 msedge.exe 94 PID 2908 wrote to memory of 3592 2908 msedge.exe 94 PID 2908 wrote to memory of 3592 2908 msedge.exe 94 PID 2908 wrote to memory of 3592 2908 msedge.exe 94 PID 2908 wrote to memory of 3592 2908 msedge.exe 94 PID 2908 wrote to memory of 3592 2908 msedge.exe 94 PID 2908 wrote to memory of 3592 2908 msedge.exe 94 PID 2908 wrote to memory of 3592 2908 msedge.exe 94 PID 2908 wrote to memory of 3592 2908 msedge.exe 94 PID 2908 wrote to memory of 3592 2908 msedge.exe 94 PID 2908 wrote to memory of 3592 2908 msedge.exe 94 PID 2908 wrote to memory of 3592 2908 msedge.exe 94 PID 2908 wrote to memory of 3592 2908 msedge.exe 94 PID 2908 wrote to memory of 3592 2908 msedge.exe 94 PID 2908 wrote to memory of 3592 2908 msedge.exe 94 PID 2908 wrote to memory of 3592 2908 msedge.exe 94 PID 2908 wrote to memory of 3592 2908 msedge.exe 94 PID 2908 wrote to memory of 3592 2908 msedge.exe 94 PID 2908 wrote to memory of 3592 2908 msedge.exe 94 PID 2908 wrote to memory of 3592 2908 msedge.exe 94 PID 2908 wrote to memory of 3592 2908 msedge.exe 94 PID 2908 wrote to memory of 3592 2908 msedge.exe 94 PID 2908 wrote to memory of 3940 2908 msedge.exe 95 PID 2908 wrote to memory of 3940 2908 msedge.exe 95 PID 2908 wrote to memory of 4128 2908 msedge.exe 96 PID 2908 wrote to memory of 4128 2908 msedge.exe 96 PID 2908 wrote to memory of 4128 2908 msedge.exe 96 PID 2908 wrote to memory of 4128 2908 msedge.exe 96 PID 2908 wrote to memory of 4128 2908 msedge.exe 96 PID 2908 wrote to memory of 4128 2908 msedge.exe 96 PID 2908 wrote to memory of 4128 2908 msedge.exe 96 PID 2908 wrote to memory of 4128 2908 msedge.exe 96 PID 2908 wrote to memory of 4128 2908 msedge.exe 96 PID 2908 wrote to memory of 4128 2908 msedge.exe 96 PID 2908 wrote to memory of 4128 2908 msedge.exe 96 PID 2908 wrote to memory of 4128 2908 msedge.exe 96 PID 2908 wrote to memory of 4128 2908 msedge.exe 96 PID 2908 wrote to memory of 4128 2908 msedge.exe 96 PID 2908 wrote to memory of 4128 2908 msedge.exe 96 PID 2908 wrote to memory of 4128 2908 msedge.exe 96 PID 2908 wrote to memory of 4128 2908 msedge.exe 96 PID 2908 wrote to memory of 4128 2908 msedge.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a03cf3da2472d1fc670ca472a44c215_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5a03cf3da2472d1fc670ca472a44c215_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=5a03cf3da2472d1fc670ca472a44c215_JaffaCakes118.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb781f46f8,0x7ffb781f4708,0x7ffb781f47183⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,6667906309708438364,15845991335911847030,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:23⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,6667906309708438364,15845991335911847030,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,6667906309708438364,15845991335911847030,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:83⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,6667906309708438364,15845991335911847030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:13⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,6667906309708438364,15845991335911847030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:13⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,6667906309708438364,15845991335911847030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:13⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,6667906309708438364,15845991335911847030,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:83⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,6667906309708438364,15845991335911847030,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,6667906309708438364,15845991335911847030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:13⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,6667906309708438364,15845991335911847030,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:13⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,6667906309708438364,15845991335911847030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:13⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,6667906309708438364,15845991335911847030,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:13⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,6667906309708438364,15845991335911847030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:13⤵PID:992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,6667906309708438364,15845991335911847030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:13⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,6667906309708438364,15845991335911847030,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6052 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3256
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=5a03cf3da2472d1fc670ca472a44c215_JaffaCakes118.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵PID:5020
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb781f46f8,0x7ffb781f4708,0x7ffb781f47183⤵PID:2412
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2856
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD575c9f57baeefeecd6c184627de951c1e
SHA152e0468e13cbfc9f15fc62cc27ce14367a996cff
SHA256648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f
SHA512c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15
-
Filesize
152B
MD510fa19df148444a77ceec60cabd2ce21
SHA1685b599c497668166ede4945d8885d204fd8d70f
SHA256c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b
SHA5123518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5653937b2392ee507cff79e257df0b98f
SHA1ca68b9cb0ef157fe773581da7393cbcb2dcf38f1
SHA2568312e78d826f9fee7a0f5d0d774b8321bf0485e910bdcfb17b26991f1d5a9906
SHA5124d772d1e26635ca501700f711c60f4dc39b500513502c8ad96d928e0b69d5f3d99748e55f8988e48592929801a541bbe55d7724f632ce2147f5e51ae778af115
-
Filesize
437B
MD505592d6b429a6209d372dba7629ce97c
SHA1b4d45e956e3ec9651d4e1e045b887c7ccbdde326
SHA2563aacb982b8861c38a392829ee3156d05dfdd46b0ecb46154f0ea9374557bc0fd
SHA512caa85bdccabea9250e8a5291f987b8d54362a7b3eec861c56f79cebb06277aa35d411e657ec632079f46affd4d6730e82115e7b317fbda55dacc16378528abaa
-
Filesize
5KB
MD5959d38dec013788fe36825346282d940
SHA1e43168a07e04ad7de972af176d45d3afffc791fb
SHA256f0b2518b0ebe531cdb460a8d54949a66b7be954809ec0acddf4b1ee47ce0ffd4
SHA5122f6a46eea0d1877f78b38d0d68d0dba0103ede2400a30e7ba8681635ae5e9a1a9f680a5263094a91dc437d7c8f128f05d15a9c7aa95f8b752ebfe447a9cc0c79
-
Filesize
6KB
MD528cf641d3c7ef05ce262a3615ba34431
SHA19fd454fbc061f40dfb659fc5f96f82c0853d1b80
SHA2563f2bd4e2312a5a63a4670b8fa5241fa6a4dee1836b5e6f3536185445df0d8c58
SHA5124a0f8a547d830f2ae99d227efa2b6eb9c51c7d9a48eab1333aa920ca7da2d2d4c4073e2dcccbb25ce77ef0572de9f392dded3db3a99f437d8ced43336721546a
-
Filesize
6KB
MD5c8ac4e323e4beb0bd84a846a3142084a
SHA176c06d3480d9e0f0c85e6e079f1d5a47ffc9b48d
SHA256d2424b18721bb2c24120ba3ebd0d59ef78c74ebe16f748e143942c9c01799976
SHA512a47a04a8ebf2709a6879d16617264124ead26f9a89c25397fb5ef0270382626bce9cfdf40da4fc79d942d5a0db1677033301909b060d9dc6fbfad3dd4f7fa1de
-
Filesize
371B
MD553e66dca63ab19ba86069a346e614e49
SHA176deda1fc1183cd5868792188cacd6508e8bb3b3
SHA25690fc3545b69da7c182cc9cae07efcb4bbaa4d25cb40910644276ff8309c9ab18
SHA512c45d0131707b7b643651982b0ad58024accce5601820f48408fa76df1cdf271146567a43f377497ebbea06ca23b57919f100776ced8aba99ce790d1c5e006f9c
-
Filesize
371B
MD52f3caf26ebd30080651b3bc37356e6a1
SHA1f1ca817abed416a439843e9d62f83a1151e51e0f
SHA256694b1d250a912abbc7610030edcada289c72174880c598606c729db0f6c2ccb4
SHA512f6db2bbcaddf01fca8b6eca27de09be73f591ea7f7c9f10fe7f9b3ce1db5678dbf52e17375ee77319914dc861cd309c857c5bc735a41038992f56a89b81ef995
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5685fcf2010ff628784519b3b8074566b
SHA1205eff6660a7e5e11f2c7f2b46416c1506355a77
SHA256fa30d4f422d12984c9080b3fba3e31265c0cffcca49108a3c3736ae540dab703
SHA5129eeb4e5c2f8f2dd19a6ab1ef0f006082d8bff04f25a86026d7d9998291a7b42cbb09d2c5d1ded3b6c220e96116dd9c358af79fc1849c74d01c600eccf3ce51cd